Next generation cryptographic ransomware

ZA Genç, G Lenzini, PYA Ryan - … 2018, Oslo, Norway, November 28-30 …, 2018 - Springer
We are assisting at an evolution in the ecosystem of cryptoware—the malware that encrypts
files and makes them unavailable unless the victim pays up. New variants are taking the …

[PDF][PDF] Applied professional ethics for the reluctant roboticist

JP Sullins - The emerging policy and ethics of human-robot …, 2015 - openroboethics.org
Since robots are designed to interact with humans, robotics applications always have ethical
implications. Until recent decades, most robotics applications were of an industrial nature …

A framework for cyber ethics and professional responsibility in computing

JK Alhassan, E Abba, S Misra, R Ahuja… - Advances in Electrical …, 2020 - Springer
In this study, a model was developed for cyber ethics and professional responsibility in
computing. There is a need for every mobile phone user to have access to cyber ethics and …

Analysis, detection, and prevention of cryptographic ransomware

ZA Genç - 2020 - orbilu.uni.lu
Cryptographic ransomware encrypts files on a computer system, thereby blocks access to
victim's data, until a ransom is paid. The quick return in revenue together with the practical …

The relevance, effectiveness, and future prospects of cyber deception implementation within organizations

K Eng, J King, C Schillaci… - Assurance and Security …, 2024 - spiedigitallibrary.org
Artificial Intelligence (AI) and Machine Learning (ML) based systems have seen tremendous
progress in the past years. This unprecedent growth has also opened new challenges and …

A Survey of Ethical Agreements in Information Security Courses

B Chukuka, M Locasto - Proceedings of the 47th ACM Technical …, 2016 - dl.acm.org
Existing ethical agreements, as applicable in the teaching of information security courses,
typically spell out rules on what students should and should not do. The main problem is that …

Design and development of Malware Repository with multi-user access and charactheristics aggregation

GMT Homb, MC Birkeland, CS Isnes, E Husbyn - 2021 - ntnuopen.ntnu.no
The NTNU Malware Lab wished to develop a platform for analysis and storage of malware
and legitimate programs where users can upload and download files, as well as viewing …

[PDF][PDF] The Impact of Ethical Regulation and Developer Reputation Scoring on Information Security Professionalism Practice

B Chukuka - 2016 - prism.ucalgary.ca
We consider the forces of ethical regulation and developer licensing in a software liability
attribution regime as two factors that may influence the information security discipline. We …

[CITATION][C] Ethics committees are not enough

SO Hansson - Theoria, 2024 - Wiley Online Library
Two major discussions on research ethics emerged in the aftermath of World War 2 (WW2).
One of them concerned the outcomes of scientific research. It focused on dangerous …